We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2022-50100

sched/core: Do not requeue task on CPU excluded from cpus_mask



Description

In the Linux kernel, the following vulnerability has been resolved: sched/core: Do not requeue task on CPU excluded from cpus_mask The following warning was triggered on a large machine early in boot on a distribution kernel but the same problem should also affect mainline. WARNING: CPU: 439 PID: 10 at ../kernel/workqueue.c:2231 process_one_work+0x4d/0x440 Call Trace: <TASK> rescuer_thread+0x1f6/0x360 kthread+0x156/0x180 ret_from_fork+0x22/0x30 </TASK> Commit c6e7bd7afaeb ("sched/core: Optimize ttwu() spinning on p->on_cpu") optimises ttwu by queueing a task that is descheduling on the wakelist, but does not check if the task descheduling is still allowed to run on that CPU. In this warning, the problematic task is a workqueue rescue thread which checks if the rescue is for a per-cpu workqueue and running on the wrong CPU. While this is early in boot and it should be possible to create workers, the rescue thread may still used if the MAYDAY_INITIAL_TIMEOUT is reached or MAYDAY_INTERVAL and on a sufficiently large machine, the rescue thread is being used frequently. Tracing confirmed that the task should have migrated properly using the stopper thread to handle the migration. However, a parallel wakeup from udev running on another CPU that does not share CPU cache observes p->on_cpu and uses task_cpu(p), queues the task on the old CPU and triggers the warning. Check that the wakee task that is descheduling is still allowed to run on its current CPU and if not, wait for the descheduling to complete and select an allowed CPU.

Reserved 2025-06-18 | Published 2025-06-18 | Updated 2025-06-18 | Assigner Linux

Product status

Default status
unaffected

c6e7bd7afaeb3af55ffac122828035f1c01d1d7b before 748d2e9585ae53cb6be48e84f93d2f082ae1d135
affected

c6e7bd7afaeb3af55ffac122828035f1c01d1d7b before fde45283f4c8a91c367ea5f20f87036468755121
affected

c6e7bd7afaeb3af55ffac122828035f1c01d1d7b before 302f7b0fc337746f41c69eb08522907f6a90c643
affected

c6e7bd7afaeb3af55ffac122828035f1c01d1d7b before 751d4cbc43879229dbc124afefe240b70fd29a85
affected

Default status
affected

5.8
affected

Any version before 5.8
unaffected

5.15.61
unaffected

5.18.18
unaffected

5.19.2
unaffected

6.0
unaffected

References

git.kernel.org/...c/748d2e9585ae53cb6be48e84f93d2f082ae1d135

git.kernel.org/...c/fde45283f4c8a91c367ea5f20f87036468755121

git.kernel.org/...c/302f7b0fc337746f41c69eb08522907f6a90c643

git.kernel.org/...c/751d4cbc43879229dbc124afefe240b70fd29a85

cve.org (CVE-2022-50100)

nvd.nist.gov (CVE-2022-50100)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2022-50100

Support options

Helpdesk Chat, Email, Knowledgebase